Sciweavers

9316 search results - page 154 / 1864
» Analysis of traceback techniques
Sort
View
ICST
2008
IEEE
15 years 10 months ago
Empirical Software Change Impact Analysis using Singular Value Decomposition
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
Mark Sherriff, Laurie Williams
WCRE
2010
IEEE
15 years 2 months ago
Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code
— The paper presents an approach that combines conceptual and evolutionary techniques to support change impact analysis in source code. Information Retrieval (IR) is used to deri...
Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk,...
113
Voted
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
15 years 10 months ago
Algebraic visual analysis: the Catalano phone call data set case study
While many clever techniques have been proposed for visual analysis, most of these are “one of” and it is not easy to see how to combine multiple techniques. We propose an alg...
Anna A. Shaverdian, Hao Zhou, George Michailidis, ...
140
Voted
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
15 years 7 months ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche
116
Voted
PEPM
1991
ACM
15 years 7 months ago
The Semantics of Scheme Control-Flow Analysis
This is a follow-on to my 1988PLDIpaper, “Control-Flow Analysis e”[9]. Iusethe methodofabstractsemanticinterpretations to explicate the control-flow analysis technique presen...
Olin Shivers